Ambit Authority
Ambit Authority makes governance decisions at the action boundary — the point where an autonomous system’s intent becomes a consequential action in a downstream system. Before any action executes, Authority renders an explicit decision: ALLOW, DENY, or ESCALATE to a human approver.
This is not monitoring. It is not observability. It is enforcement — evaluated and recorded before the action takes effect.
Authority is cross-runtime by default. Enterprises run multiple agent runtimes, model providers, and toolchains; governance tied to a single vendor or a single runtime produces inconsistent decisions and inconsistent evidence.
Ambit in the Agent Runtime Stack
The AI stack is converging around distinct layers: agents that reason and plan, runtimes that execute and orchestrate, data systems that persist state, and infrastructure that governs, secures, and observes.
Ambit operates at the governance layer. It does not execute workflows, orchestrate tool calls, manage agent memory, or scale compute. Those are runtime responsibilities.
Authority integrates with agent runtimes at the action boundary — the point where a runtime is about to produce a side effect in a downstream system. The runtime handles execution. Authority handles permission. The decision is rendered and recorded before the side effect occurs.
This separation is architectural, not incidental. Runtimes that embed governance produce vendor-coupled decisions and leave no independent evidence trail. A governance layer that is independent of the runtime produces consistent decisions and portable evidence — regardless of which runtime executes the action.
Runtimes execute. Authority governs. Observatory explains.
Decision Outcomes
Every evaluation produces one of three outcomes:
Decision precedence is strict: DENY overrides ESCALATE, ESCALATE overrides ALLOW. Governance is conservative by default.
Escalation is proportional friction — reserved for high-impact or ambiguous actions. The goal is not to block autonomy; it is to make delegation defensible without creating an approval queue that grows without bound.
How Decisions Are Made
Every decision is evaluated against two inputs: organisational policy and delegated authority.
Request Arrives
An autonomous system requests to execute an action (send message, write data, transfer funds, modify infrastructure).
Evaluate Policy + Delegation
Authority checks: is there a valid delegation? Does policy permit this action? Both must be satisfied. A valid delegation does not override policy. A permissive policy does not substitute for delegation.
Render Decision
Authority produces one outcome: ALLOW (action proceeds), DENY (action blocked), or ESCALATE (human approval required). Decision precedence is strict: DENY overrides ESCALATE, ESCALATE overrides ALLOW.
Record Evidence Record
Before the action executes, a evidence record is committed to the append-only decision ledger: what was requested, by whom, under which policy, with what outcome, and why.
Enforcement Placement
Authority operates at the action boundary — the enforcement point between autonomous intent and consequential action. It integrates with agent runtimes at the point where execution produces side effects, deploying as an SDK wrapper, tool boundary, or local enforcement service within the customer environment.
Gateways move requests. Authority decides whether the underlying action is authorised under a delegation and policy, and records why. If you already have a gateway, Authority can integrate with it — but it is a decision layer, not a traffic layer.
Authority enforces governance at multiple planes:
Execution Layer
Access Control
Boundary Control
The enforcement point varies by integration. The invariant does not: no downstream action executes without a governance decision and a evidence record. Different architectures place the valve in different locations; the primitive stays the same — decide before execution, produce evidence.
Why Existing Tools Are Not Enough
Each of these tools addresses a legitimate concern. None of them answers the question that autonomous systems create: was this specific action, at this specific moment, authorised under a specific policy by a specific delegation of authority?
Technical Characteristics
Decision Evidence Record Example
The example below shows the fields captured for a single decision, including policy hash, delegation state, evaluation timing, and an integrity signature. Values are synthetic and illustrative. Operational evidence records also include additional contract-reference metadata that binds each decision to the exact governance contract in effect at decision time.
- action
- refund.issue
- action_hash
- sha256:e3b0c44298fc1c14…
- principal
- support-agent-07
- policy
- org/finance/refund-v3
- policy_hash
- sha256:a1b2c3d4e5f67890…
- delegation_id
- del-8k3m-9n2p
- delegation_valid
- 2026-01-10T00:00Z → 2026-02-10T00:00Z
- delegation_scope
- refund.issue ≤ 500 AUD
- decision
- ALLOW
- basis
- Policy match: refund.issue permitted under org/finance/refund-v3. Delegation valid and active. Amount within scope ($127.50 ≤ $500 AUD).
Evidence Records are designed output, not a logging byproduct. Each evidence record is signed with an HMAC-SHA256 integrity signature that makes tampering detectable. The decision ledger is append-only and tamper-evident, and is structured to survive incident review and regulatory inquiry. Over time, it becomes the system of record for autonomous authority inside the organisation.
Authority decides. Observatory explains.
Observatory deep-dive